Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 16:18 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2cfee9b0852010e55ce155997cdaf10d_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2cfee9b0852010e55ce155997cdaf10d_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2cfee9b0852010e55ce155997cdaf10d_JaffaCakes118.dll
-
Size
80KB
-
MD5
2cfee9b0852010e55ce155997cdaf10d
-
SHA1
093bd8bd9c40772e0e9e90167090717662fc45ee
-
SHA256
39aea8b55adac7b862b82000dcf9acdf0960fdace9acdd88a182773fce65ef1e
-
SHA512
05f8b5053c7deca637614856133cca7479334871c3257c0b8489e83c0d9a368058ea303480735e62530b3c365a3ab8c54c9dc72ebe2cd88b689442210b632b22
-
SSDEEP
1536:Dq8wUmtGoNfNT9AcnZDzdheQpB79dUZYTQqz9VJrsQ:lmtBNT9AcZDHfB7AZYTxzTZ
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2436 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2436 2264 rundll32.exe 30 PID 2264 wrote to memory of 2436 2264 rundll32.exe 30 PID 2264 wrote to memory of 2436 2264 rundll32.exe 30 PID 2264 wrote to memory of 2436 2264 rundll32.exe 30 PID 2264 wrote to memory of 2436 2264 rundll32.exe 30 PID 2264 wrote to memory of 2436 2264 rundll32.exe 30 PID 2264 wrote to memory of 2436 2264 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cfee9b0852010e55ce155997cdaf10d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cfee9b0852010e55ce155997cdaf10d_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2436
-